Cisco Cisco IOS Software Release 15.0(1)M

Página de 248
93
OL-20799-01 Rev. L0
Caveats
displayed in <CmdBold>show diag<noCmdBold>. But, the <CmdBold>show
diag<noCmdBold> has entry for all. 
ceAssetOrderablePartNumber.16 = NM-1T3/E3=
ceAssetOrderablePartNumber.19 = SM-NM-ADPTR
ceAssetMfgAssyNumber.1 = 800-33013-01 <<<<<<< As per <CmdBold>show
diag<noCmdBold> output, the Assy Number for CISCO3945-CHASSIS is 800-31577-01
ceAssetMfgAssyNumber.3 = 800-33013-01
ceAssetMfgAssyNumber.11 = 800-30005-01
ceAssetMfgAssyNumber.14 = 800-30005-01
ceAssetMfgAssyNumber.16 = 800-19180-02
ceAssetMfgAssyNumber.19 = 800-30005-01
ceAssetMfgAssyRevision.1 = 08 <<<<< Should be A0
ceAssetMfgAssyRevision.3 = 08
ceAssetMfgAssyRevision.11 = 06  <<<<<<<<<<< Board revision is displayed for
SM-NM-Adapter, but <CmdBold>show diag<noCmdBold> does not have slot 1 information.
ceAssetMfgAssyRevision.14 = 
ceAssetMfgAssyRevision.16 = A0
ceAssetMfgAssyRevision.19 = 
CSCtl99174
Cisco IOS Software contains a memory leak vulnerability that could be triggered through the 
processing of malformed Session Initiation Protocol (SIP) messages. Exploitation of this 
vulnerability could cause an interruption of services. Only devices that are configured for SIP 
inspection are affected by this vulnerability.
Cisco has released free software updates that address this vulnerability. There are no workarounds 
for devices that must run SIP inspection.
This advisory is available at the following link:
CSCto60258
Symptoms: Voice call may fail with MGCP controlled FXS port.
Conditions: Adding both commands mgcp default-package fxr-package and mgcp fax t38 inhibit 
under MGCP may cause voice call to fail.
Workaround: Disable one of the commands under MGCP configuration. 
CSCtz35999
The Cisco IOS Software Protocol Translation (PT) feature contains a vulnerability that could allow 
an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
Cisco has released free software updates that address this vulnerability. 
Workarounds that mitigate this vulnerability are available.
This advisory is available at the following link: 
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled publication includes 
seven Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each 
Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the 
vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases 
that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled publication.
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security 
Advisory Bundled Publication” at the following link: